Kotrappa Sirbi, Prakash Jayanth Kulkarni
|
|
- Dominick Oliver
- 8 years ago
- Views:
Transcription
1 99 Stronger Enforcement of Security Using AOP & Spring AOP Kotrappa Sirbi, Prakash Jayanth Kulkarni Abstract An application security has two primary goals: first, it is intended to prevent unauthorised personnel from accessing information at higher classification than their authorisation. Second, it is intended to prevent personnel from declassifying information. Using an object oriented approach to implementing application security results not only with the problem of code scattering and code tangling, but also results in weaker enforcement of security. This weaker enforcement of security could be due to the inherent design of the system or due to a programming error. Aspect Oriented Programming (AOP) complements Object- Oriented Programming (OOP) by providing another way of thinking about program structure. The key unit of modularity in OOP is the class, whereas in AOP the unit of modularity is the aspect. The goal of the paper is to present that Aspect Oriented Programming AspectJ integrated with Spring AOP provides very powerful mechanisms for stronger enforcement of security.aspectoriented programming (AOP) allows weaving a security aspect into an application providing additional security functionality or introducing completely new security mechanisms.implementation of security with AOP is a flexible method to develop separated, extensible and reusable pieces of code called aspects.in this comparative study paper, we argue that Spring AOP provides stronger enforcement of security than AspectJ.We have shown both Spring AOP and AspectJ strive to provide a comprehensive AOP solutions and complements each other. Index Terms Aspect Oriented Programming (AOP), AspectJ, Spring AOP, Acegi. 1 INTRODUCTION C omputer security is a science concerned with the control of risks related to computer use.the accelerating trends of interconnectedness, extensibility and complexity are increasing the threat of such a risk [1]. Application security hardening becomes a priority and one of the fastest growing fields in IT market today. The main goal of application security hardening is to reinforce the application security and therefore to minimize the likelihood of violating security properties.a legitimate question that one could ask is: What is the most appropriate computation style or programming paradigm for security hardening? A natural answer is to resort to an aspect oriented language. This answer is justified by the fact that aspect oriented languages have been created to deal with the separation of concerns. This is exactly what a security engineer needs when hardening an application. Security engineer would like to inject and strengthen security without digging in the logic of the application/middleware. Aspect Oriented Programming (AOP) [2] has been proposed as a way to improve modularity of software systems by allowing encapsulation of crosscutting concerns. Crosscutting concerns generally refer to non functional properties of software such as security, synchronization, Kotrappa Sirbi is with K L E s College of Engineering & Technology, Belgaum, , India Prakash Jayanth Kulkarni is with Walchand College of Engineering, Sangli, India logging, etc. When programmed, these crosscutting concerns result in tangled and scattered code. In this paper, we address the stronger enforcement of security of AspectJ comes with new concepts and constructs such as: join points, pointcuts, and advices [10].A join point is a point in the control flow graph of an application such as method call, object construction, or field access.a pointcut is a concept that classifies join points in the same way a type classifies values. Accordingly, AspectJ defines various pointcut constructors to designate various join points. An advice is a code fragment executed when join points satisfying its pointcut are reached. This execution can be done before, after, or around a specific join point. Spring introduces a simpler and more powerful way of writing custom aspects using either a schema-based approach or annotation style. Both of these styles offer fully typed advice and use of the AspectJ pointcut language, while still using Spring AOP for weaving. The spring supports schema AOP. Spring AOP [3] remains fully backwards compatible with Spring AOP and the lower-level AOP support offered by the Spring APIs of earlier version. AOP is used in the Spring Framework to provide declarative enterprise services, especially as a replacement for EJB declarative services. The most important such service is declarative transaction management and allow users to implement custom aspects, complementing their use of OOP with AOP. In this paper, we present a comparative study whether AspectJ alone enough and/or there is usefulness of Spring AOP for stronger enforcement of security in application development.
2 100 The remainder of this paper is structured in the following way.the security requirements in enterprise applications is discussed section 2 and section 3 deals with the AspectJ & Spring AOP features for security perspectives, section 4 discuss the implementation of access control and section 5 deals with comparision of AOP AspectJ and Spring AOP security features and their usefulness from a security point of view. 2 SECURITY REQUIREMENTS OF ENTER- PRISE APPLICATIONS Security is an important consideration in modern, highly connected software systems.most applications need to expose functionality through multiple interfaces to allow access to the business data and make complex integration possible. But they need to do so in a secured manner. It isn t a surprise that most enterprises spend substantial time, energy, and money to secure applications. Security is a very important issue in enterprise class information systems, especially in portal/internet applications. It is related to a possibly huge quantity of sensitive resources in the system and potentially unlimited users access to the application. A violation of security may cause catastrophic consequences for organizations whose security critical information may be disclosed without authorization, altered, lost, or destroyed. There are many standards of security functionality requirements for applications [6], [7], [8], [21]. The most important security functions are: Identification and authentication: the process of establishing and verifying the claimed identity of user, Access control: the prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner, Accountability: the property that ensures that the actions of an entity may be traced uniquely to the entity, Audit: an independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, and to recommend any indicated changes in control, policy, and procedures. In this paper, we focus on authentication and access control functions of security. 3 AOP-ASPECTJ AND SPRING AOP SECURITY 3.1 Aspect Oriented Programming Aspect Oriented Programming (AOP) is the invention of a programming paradigm developed by the Xerox Palo Alto Research Center (Xerox PARC) in the 20th century [14],[15].It allows developers to separate tasks that should not be entangled with the crosscutting concerns, so as to provide better procedures for the encapsulation and interoperability.the core thought of AOP is to makes a complex system as combinations by a number of concerns to achieve. After demand researched, the concerns are divided into two parts: crosscutting concerns and core business concerns. Core business concern is the needs of the business logic and associated business subsystems, such as financial systems, personnel systems. And crosscutting concern is the needs of the various subsystems business, may be involved in some of the public functions, such as log records, security and so on. 3.2 AspectJ and Spring AOP AspectJ and Spring AOP concepts are: Aspect: A modularization of a concern that cuts across multiple objects. Join point: A point during the execution of a program, such as the execution of a method or the handling of an exception. In Spring AOP, a join point always represents a method execution. Join point information is available in advice bodies by declaring org.aspectj.lang.joinpoint parameter type. Advice: Action taken by an aspect at a particular join point. Different types of advice include ʺaround,ʺ ʺbeforeʺ and ʺafterʺ advice. Many AOP frameworks, including Spring, model an advice as an interceptor, maintaining a chain of interceptors aroundʺ the join point. Pointcut: A predicate that matches join points. Advice is associated with a pointcut expression and runs at any join point matched by the pointcut (for example, the execution of a method with a certain name).the concept of join points as matched by pointcut expressions is central to AOP.Spring uses the AspectJ pointcut language by default. Introduction: Also known as an inter type declaration.declaring additional methods or fields on behalf of a type. Spring AOP allows introducing new interfaces and a corresponding implementation to any proxied object. Target object: Object being advised by one or more aspects. Also referred to as the advised object. Since Spring AOP is implemented using runtime proxies, this object will always be a proxied object. Weaving: Linking aspects with other application types or objects to create an advised object. This can be done at compile time (using the AspectJ compiler, for example), load time, or at runtime. Spring AOP, like other pure Java AOP frameworks, performs weaving at runtime. Different advice types include: Around advice: Advice that surrounds a joinpoint such as a method invocation. This is the most powerful kind of advice. Around advices will perform custom behavior before and after the method invocation.they are responsible for choosing whether to proceed to the joinpoint or to
3 101 shortcut executing by returning their own return value or throwing an exception. Before advice: Advice that executes before a joinpoint, but which does not have the ability to prevent execution flow proceeding to the joinpoint unless it throws an exception. Throws advice: Advice to be executed if a method throws an exception.spring provides strongly typed throws advice, so it is possible to write code that catches the exception (and subclasses),without needing to cast from Throwable or Exception. After returning advice: Advice to be executed after a joinpoint completes normally i.e., if a method returns without throwing an exception. Around advice is the most general kind of advice. Most interception-based AOP frameworks, such as Nanning Aspects, provide only around advice. As spring, like AspectJ, provides a full range of advice types.the pointcut concept is the key to AOP, distinguishing AOP from older technologies offering interception.pointcuts enable advice to be targeted independently of the OO hierarchy and also pointcuts provide the structural element of AOP. AspectJ has a comprehensive and expressive pointcut specification language that allows specifying particular points in the control flow of the program where advices are to be applied. All of them are important from a security standpoint.table 1 shows the usefulness of the AspectJ pointcuts according to the security target. Although AspectJ supports those efficient and useful pointcut designators for security hardening, they are not enough to express all the security hardening practices. Indeed, the following possible extensions to AspectJ are identified for security hardening: Dataflow pointcut. Predicted control flow pointcut. Loop pointcut. Wildcard for pattern matching. Modifiers in type pattern syntax. Pointcuts for getting and setting local variables. Synchronized block join points. The detailed discussion about the suggested extensions available in [4], [5], [10],[12],[13],[18]. 3.3 Spring AOP and Security Spring AOP In Spring AOP aspects are nothing more than regular spring beans, which themselves are plain-old Java objects (POJO) registered suitably with the Spring Inversion of Control container. The core advantage in using Spring AOP is its ability to realize the aspect as a plain Java class. In Spring AOP, a join point exclusively pertains to method execution only, which could be viewed as a limitation of Spring AOP. However, in reality, it is enough to handle most common cases of implementing crosscutting concern. Spring AOP uses the AspectJ pointcut expression syntax [3], [9], [11], [16], [19]. TABLE 1 ASPECTJ POINTCUT AND SECURITY Spring Security Spring security began in late 2003 as The Acegi Security System for Spring, Acegi Security became an official Spring Portfolio project towards the end of 2007 and was rebranded as Spring Security [17].Spring Security (formerly known as Acegi) along with AOP can simplify the implementation of the classic crosscutting concern of stronger enforcement of security in an application. Enterprise applications need to address many crosscutting functionalities: transaction management, security, auditing, service-level agreement, monitoring, concurrency control, improving application availability, error handling, and so on. Many enterprise applications use AOP to implement these functionalities. All the examples in given here are based on real-world problems and their AOP solutions.virtually every project that uses Spring uses AOP [9].Many applications start with prewritten aspects supplied with Spring (primarily transaction management and security).but due to the AspectJ syntax, writing custom aspects is becoming a common task. After reaching the limits of Spring AOP, many applications move toward AspectJ weaving. The typical trigger point for this change is crosscutting of domain objects or other forms of deeper crosscutting functionalities.at that time, it s common to start with the AspectJ syntax (which is used with Spring s proxy-based AOP) along with the load-time weaver. However, applications that don t use spring often use AspectJ weaving from the beginning. Spring security along with AOP can simplify the implementation of the classic crosscutting concern of securing enterprise application.the security aspect needs to do two things, firstly select join points that need authentication or authorization and then advise the selected join points to perform authentication and authorization as shown in Listing 1. The interesting piece of code is the computation of the security attributes. In the conventional technique, each method creates a separate security attribute object. In an AOP solution, the same advice applies to all advised join points, yet each join point may require a different attribute.therefore, the advice may need some cooperation from the advised code or some external configuration
4 102 to compute a correct attribute at each join point. One way to achieve this collaboration is to use annotations and also security aspects can be applied using either the proxybased or byte code based AOP. The security aspect acts as a controller that mediates between the core system and the security subsystem. Figure 1 show the overall structure used in Spring Security for authentication. Authorization is a process that establishes whether an authenticated user has sufficient privileges to access certain resources. For example, only users with the admin privilege may access certain web pages or invoke certain business methods. Spring Security provides role-based and object-level authorization. To accommodate potentially complex custom requirements, it provides several components that can customize. Figure 2 depicts the authorization sequence. Security requirements vary widely, and many implementations exist to meet these needs [20], [21]. For example, an authentication requirement may vary from simple web-based authentication to a single sign-on solution.storage for credentials (such as passwords) and authorities (typically roles such as ADMIN or USER) varies widely as well from a simple text file to a database or Lightweight Directory Access Protocol (LDAP).These variations make the already complex topic of security even more so. The increased complexity warrants raising the level of abstraction. But creating such an abstraction is very complex task. This is where Spring Security comes into play [16]. By providing an abstraction layer and an implementation for most commonly used security systems. Furthermore, Spring Security provides ready-made solutions for a few common scenarios that allow implementing certain security requirements by including just a few lines of configuration. 4 ACCESS CONTROL TECHNIQUES IN SPRING AOP Access control is a server side mechanism.after invokeng a method the decision has to be made whether the method is allowed to be executed or not [20]. Authentication is a process that verifies that the user (human or machine) is indeed whom they claim to be. For example, the system may challenge the user with a username and password. When the user enters that information, the system verifies it against the stored credentials. Spring Security supports authentication using a wide range of authentication schemes such as basic, forms, database, LDAP, JAAS, and single sign-on. It can also be roll its own authentication to support the specific scheme that the organization is using (and still utilize the rest of the framework, including authorization).after the user credentials have been authenticated, the authenticated user (known as the principal) is stored in the security context. Implementing security using proxy based Spring AOP shown in Figure 3.Because of similarities due to the common use of AOP as the underlying mechanism. Spring AOP creates a proxy around the service beans, and the security advice ensures authorized access. Spring AOP works only with spring beans. 3.1 Spring Security prebuilt solutions Spring Security provides ready-made solutions that enable developers to secure applications with a few lines of configuration. These solutions target different parts of application: web, service layer, and domain objects.
5 Web security Securing web applications is a common task, therefore, Spring Security provides special support for this scenario. With namespace-based configuration, a few lines can configure URL level security that ensures that the user has the right authority to access the URLs. 5 IMPLEMENTATION OF SECURITY 5.1 Implementaion of Authentication To implement security, 3 rd party example is used which is party implemented using Acegi. Acegi [17] is a popular and flexible security framework that can be used in enterprise applications.acegi integrates well with spring and uses spring application contexts for all configurations. Using Acegi Security greatly simplifies implementing authorization in application in a flexible manner. To implement, start with POJO class that will implement the security concern as a Spring AOP[3],[9],[16] aspect and the implementation of method checksecurity ( ) (as shown in Listing 3) involves using Acegi APIs and classes such as SecurityContextHolder for retrieving the authenticated user and the user's role. Using the user and his role, an application-specific authorization can be implemented. For example, the following spring configuration provides authentication using a default login page and ensures that any URLs that end with delete.htm are accessible only by users with the ADMIN role. Other URLs are accessed only by users with the USER role. The declaration of user service to provide username/password Typically, firstly start with a simple snippet as shown in listings 2, modify various attributes, and add additional elements to tailor to the specific needs Service Level Security Because most enterprise applications utilize a service layer as the exclusive way of accessing business functionality, it makes sense to secure this layer. Spring Security provides prebuilt aspects along with namespace-based configuration support to secure the service layer with minimal code. It offers two options to specify the accesscontrol information: through the XML-based configuration and through annotations. The important thing to note here is that the entire authorization check lies in a separate aspect (POJO class), which is distinct from the business logic code.this security aspect can be effectively applied to business logic method using the following spring configuration.firstly, register the regular Java class SecurityAspect with spring as a spring bean and then, specify the pointcut and advice: The pointcut expression is execution (*com.myorg.springaop.examples.myservice*.*(..) ) The advice type is "around," and the aspect method name is checksecurity.
6 104 The spring configuration (as shown in Listing 4) for the security aspect, Additionally, a spring configuration is needed for configuring Acegi with spring. The configuration uses an inmemory data access object (DAO) provider, in which case, the developer specifies the potential users and roles in the application as simple name-value pairs, as a part of the static spring configuration file. This can easily be inferred from the following spring configuration (as shown in Listing 5): programmer needs to add additional fields to a class, or advise fine-grained objects that are not created by the Spring IoC container, in that situation Aspectj is best alternative. Also spring provides a powerful integration with AspectJ.The most important part of the Spring/AspectJ integration allows spring to configure AspectJ aspects using Dependency Injection. This brings similar benefits to aspects as to objects. There is no need for aspects to use ad hoc configuration mechanisms; they can be configured in the same, consistent, approach used for the entire application. Aspects can depend on application objects. For example, a security aspect can depend on a security manager. It's possible to obtain a reference to an aspect through the relevant spring context. This can allow for dynamic reconfiguration of the aspect. AspectJ aspects can expose JavaBean properties for Setter Injection, and even implement spring lifecycle interfaces such as BeanFactoryAware.In most cases, AspectJ aspects are singletons, with one instance per class loader. This single instance is responsible for advising multiple object instances.a Spring IoC container cannot instantiate an aspect, as aspects don't have callable constructors. But it can obtain a reference to an aspect using the static aspectof() method that AspectJ defines for all aspects, and it can inject dependencies into that aspect. Consider a security aspect, which depends on a security manager. This aspects applies to all changes in the value of the balance instance variable in the Account class.it couldn't do in case of using Spring AOP.The AspectJ code for the aspect (one of the Spring/AspectJ samples), is shown below (Listing 6) 5.2 Case Study: AspectJ and Spring AOP Integration Spring's proxy-based AOP framework is well suited for handling many generic middleware and application specific problems. However, there are times when a more powerful AOP solution is required: for example, if This aspect can be configuring in the same way as an ordinary class. Developer doesn t need to do anything in spring configuration to target this aspect. It contains the pointcut information in AspectJ code that controls where it applies. Thus it can apply even to objects not managed by the Spring IoC container.using AspectJ pointcuts to target spring advice, we plan to provide the ability for AspectJ pointcut expressions to be used in Spring XML or other
7 105 bean definition files, to target spring advice. This will allow some of the power of the AspectJ pointcut model to be applied to spring s proxy-based AOP framework. This will work in pure Java, and will not require the AspectJ compiler. Only the subset of AspectJ pointcuts relating to method invocation will be usable.in a latest release of spring will have some spring services packages, such as the declarative transaction management service, as AspectJ aspects. This will enable developer to be used by AspectJ users without dependence on the Spring AOP framework potentially, even without dependence on the Spring IoC container. This feature is probably of more interest to AspectJ users than spring users [20]. 6 CONCLUSION Without AOP the functionalities of security would be scattered across the application, with the same code duplicated in different modules. In fact, AOP applied to security solves most of the common practical problems concerning security. We have seen how it is possible to implement these functionalities without having tangled or scattered code, implementing functionalities with aspects and advices.with AOP AspectJ and Spring AOP, configuring it properly for stronger enforcement security of the application thereby we can have cleaner code, much more concise and easier to maintain, debug and adopt. This paper shows how Spring AOP Security up close to reality through implementation of authentication and authorization security crosscutting concerns for strong enforcement of security. REFERENCES [1] G. McGraw and G. Morrisett. Attacking Malicious Code : A Report to the Infosec Research Council. IEEE Software, 17(5):33 41, [2] G. Kiczales, J. Lamping, A. Menhdhekar, C. Maeda, C.Lopes, J.M.Loingtier, and J. Irwin. Aspect oriented programming. In Mehmet Aks it and Satoshi Matsuoka, editors, Proceedings European Conference on Object- Oriented Programming, volume 1241, pages Springer-Verlag, Berlin, Heidelberg, and New York, [3] Ramnivas Laddad, Enterprise AOP with Spring Applications: AspectJ in Action, 2 nd Edition, Manning Publications, [4] Ramnivas Laddad, AspectJ in Action: Practical Aspect- Oriented Programming by Manning Publications, [5] G. Kiczales, E. Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, and William Griswold. An Overview of AspectJ by Budapest, 2001.Springer Verlag. [6] Security Functionality Requirements, National Institute of Standards and Technology, [7] Technical Security Standard for Information Technology (TSSIT), Government of Canada, [8] Information Technology Security Evaluation Criteria (ITSEC), Department of Trade and Industry, London, [9] Massimiliano Dessì Spring 2.5 Aspect-Oriented Programming by Packt Publishing [10] Dima Alhadidi, Nadia Belblidiay, Mourad Debbabi, AspectJ Assessment from a Security Perspective by Concordia Institute for Information Systems Engineering Concordia University, Montreal, Quebec, Canada. [11] Aspect Oriented programming with Spring; Spring Framework: html [12] AspectJ Group Tutorial - Aspect-Oriented Programming with AspectJ by AspectJ Workshop, Xerox PARC, tj/ [13] AspectJ, [14] AOP Issue, Communications of the ACM, Volume 44, Number 10, 2001 [15] Elrad, T, R. Filman, A. Bader. Aspect-Oriented Programming. CACM, Volume 44, Number 10, [16] [17] [18] Dima Alhadidi, Nadia Belblidia, Amine boukhtouta, Mourad Debbabi. Extending AspectJ Open Source for Application Security Hardening by Concordia Institute for Information Systems Engineering, Concordia University. [19] /reference/springsecurity-single.html [20] Pawel Slowikowski,Krzysztof Zielinski, Comparison Study of Aspect Oriented and Container Managed Security by AGH University of Seince and Technology, Krakow, university in Poland. [21] Kotrappa Sirbi, Prakash Jayanth Kulkarni, Embedding Security using Aspect Oriented Programming by International Journal of Computer Engineering & Information Technology, SERC Kotrappa Sirbi, M Tech (CSE, 2009), M S (Software System, 1994) and B E (EE, 1984) working with K L E s College of Enginering & Technology Belgaum, India since Dec 1985 and at present working with KLE s BCA, R L S Institute, Belgaum (on deputation).having two International conferences and two National conferences papers and two journal papers published.areas of interest are Software Engineering, Object Technology and its evolutions like., Design Patterns, Subject Oriented Programming(SOP) and Aspect Oriented Programming(AOP).Membership of Technical profesional bodies:life member of ISTE(Indian Society For Technical Education) and member of CSTA (Computer Science Teacher Association),ACM. Prakash Jayanth Kulkarni Ph.D (Electronics, 1993), M E (Electronics, 1986) by Research and B E (Electronics & Telecommunication) working with Walchand College of Engineering, Sangli, India since 1981 and worked with Trans Lines Division, M.S.E.B,having thirteen International conferences papers and nine National Conference papers and six journals paper. His areas of interest are Digital Communication, Digital Image Processing and Computer Vision, Software Engineering, Artificial Neural Network and Genetic Algorithms. In 2001 he received a distinguish Samaj Shree Award for rendering services to society.
Aspect-Oriented Programming
Aspect-Oriented Programming An Introduction to Aspect-Oriented Programming and AspectJ Niklas Påhlsson Department of Technology University of Kalmar S 391 82 Kalmar SWEDEN Topic Report for Software Engineering
More informationAspect-Oriented Web Development in PHP
Aspect-Oriented Web Development in PHP Jorge Esparteiro Garcia Faculdade de Engenharia da Universidade do Porto jorge.garcia@fe.up.pt Abstract. Aspect-Oriented Programming (AOP) provides another way of
More informationGenerating Aspect Code from UML Models
Generating Aspect Code from UML Models Iris Groher Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich, Germany Iris.Groher@fh-hagenberg.at Stefan Schulze Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich,
More informationAspect Oriented Programming. with. Spring
Aspect Oriented Programming with Spring Problem area How to modularize concerns that span multiple classes and layers? Examples of cross-cutting concerns: Transaction management Logging Profiling Security
More informationAspect-oriented Refactoring of a J2EE Framework for Security and Validation Concerns
Aspect-oriented Refactoring of a J2EE Framework for Security and Validation Concerns CS 586 Aspect-Oriented Software Development Project Group Members : Başak Çakar, Elif Demirli, Şadiye Kaptanoğlu Bilkent
More informationCoordinated Visualization of Aspect-Oriented Programs
Coordinated Visualization of Aspect-Oriented Programs Álvaro F. d Arce 1, Rogério E. Garcia 1, Ronaldo C. M. Correia 1 1 Faculdade de Ciências e Tecnologia Universidade Estadual Paulista Júlio de Mesquita
More informationA COMPARISON OF AOP BASED MONITORING TOOLS
STUDIA UNIV. BABEŞ BOLYAI, INFORMATICA, Volume LVI, Number 3, 2011 A COMPARISON OF AOP BASED MONITORING TOOLS GRIGORETA S. COJOCAR AND DAN COJOCAR Abstract. The performance requirements of a software system
More informationIntegration of Application Business Logic and Business Rules with DSL and AOP
Integration of Application Business Logic and Business Rules with DSL and AOP Bogumiła Hnatkowska and Krzysztof Kasprzyk Wroclaw University of Technology, Wyb. Wyspianskiego 27 50-370 Wroclaw, Poland Bogumila.Hnatkowska@pwr.wroc.pl
More informationUnification of AOP and FOP in Model Driven Development
Chapter 5 Unification of AOP and FOP in Model Driven Development I n this chapter, AOP and FOP have been explored to analyze the similar and different characteristics. The main objective is to justify
More informationToward Configurable Access Control for. Healthcare Information Systems
Toward Configurable Access Control for Healthcare Information Systems Kung Chen a and Da-Wei Wang b a Department of Computer Science, National Chengchi University b Institute of Information Science, Academia
More informationNew Generation of Software Development
New Generation of Software Development Terry Hon University of British Columbia 201-2366 Main Mall Vancouver B.C. V6T 1Z4 tyehon@cs.ubc.ca ABSTRACT In this paper, I present a picture of what software development
More informationSOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
More informationProgress Report Aspect Oriented Programming meets Design Patterns. Academic Programme MSc in Advanced Computer Science. Guillermo Antonio Toro Bayona
Progress Report Aspect Oriented Programming meets Design Patterns Academic Programme MSc in Advanced Computer Science Guillermo Antonio Toro Bayona Supervisor Dr. John Sargeant The University of Manchester
More informationOUR COURSES 19 November 2015. All prices are per person in Swedish Krona. Solid Beans AB Kungsgatan 32 411 19 Göteborg Sweden
OUR COURSES 19 November 2015 Solid Beans AB Kungsgatan 32 411 19 Göteborg Sweden Java for beginners JavaEE EJB 3.1 JSF (Java Server Faces) PrimeFaces Spring Core Spring Advanced Maven One day intensive
More informationCombining Static and Dynamic Impact Analysis for Large-scale Enterprise Systems
Combining Static and Dynamic Impact Analysis for Large-scale Enterprise Systems The 15th International Conference on Product-Focused Software Process Improvement, Helsinki, Finland. Wen Chen, Alan Wassyng,
More informationORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
More informationChapter 5 Aspect Oriented Programming
2I1AC3 : Génie logiciel et Patrons de conception Chapter 5 Aspect Oriented Programming J'ai toujours rêvé d'un ordinateur qui soit aussi facile à utiliser qu'un téléphone. Mon rêve s'est réalisé. Je ne
More informationUsing an Aspect Oriented Layer in SOA for Enterprise Application Integration
19 Using an Aspect Oriented Layer in SOA for Enterprise Application Integration Chinthaka D. Induruwana School of Computer Science, University of Manchester, Kilburn Building, Oxford Road M13 9PL induruwc@cs.man.ac.uk
More information<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style
Hudson Security Architecture Click to edit Master subtitle style Winston Prakash Hudson Security Architecture Hudson provides a security mechanism which allows Hudson Administrators
More informationAspects for Testing Aspects?
Aspects for Testing Aspects? Dehla Sokenou, Stephan Herrmann Technische Universität Berlin Software Engineering Group Sekr. FR 5-6, Franklinstr. 28/29, D-10587 Berlin [dsokenou stephan]@cs.tu-berlin.de
More informationImplementing COOL in JAMI
Implementing COOL in JAMI Steven te Brinke s.tebrinke@student.utwente.nl ABSTRACT JAMI aims to be a generic aspect interpreter framework which can be used to prototype a wide range of AOP languages. However,
More informationWelcome to Spring Forward 2006. www.springforward2006.com September 26, 2006 Penn State Great Valley
Welcome to Spring Forward 2006 Securing Your Applications with CAS and Acegi Dmitriy Kopylenko Application Developer Architecture & Framework Rutgers University Scott Battaglia Application Developer Enterprise
More informationSPRING INTERVIEW QUESTIONS
SPRING INTERVIEW QUESTIONS http://www.tutorialspoint.com/spring/spring_interview_questions.htm Copyright tutorialspoint.com Dear readers, these Spring Interview Questions have been designed specially to
More informationUsing EMC Documentum with Adobe LiveCycle ES
Technical Guide Using EMC Documentum with Adobe LiveCycle ES Table of contents 1 Deployment 3 Managing LiveCycle ES development assets in Documentum 5 Developing LiveCycle applications with contents in
More informationKeywords Aspect-Oriented Modeling, Rule-based graph transformations, Aspect, pointcuts, crosscutting concerns.
Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Functional and Non-Functional
More informationComponent-Based Software Development with Aspect-Oriented Programming
Vol. 4, No. 3 Special issue: GPCE Young Researchers Workshop 2004 Component-Based Software Development with Aspect-Oriented Programming Michael Eichberg, Departement of Computer Science, Darmstadt University
More informationDecomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
More informationInternational Journal of Web & Semantic Technology (IJWesT) Vol.3, No.3, July 2012. Vishnuvardhan Mannava 1 and T. Ramesh 2
COMPOSITE DESIGN PATTERN FOR FEATURE- ORIENTED SERVICE INJECTION AND COMPOSITION OF WEB SERVICES FOR DISTRIBUTED COMPUTING SYSTEMS WITH SERVICE ORIENTED ARCHITECTURE Vishnuvardhan Mannava 1 and T. Ramesh
More informationWhite Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
More informationUsing weblock s Servlet Filters for Application-Level Security
Using weblock s Servlet Filters for Application-Level Security September 2006 www.2ab.com Introduction Access management is a simple concept. Every business has information that needs to be protected from
More informationGlassbox: Open Source and Automated Application Troubleshooting. Ron Bodkin Glassbox Project Leader ron.bodkin@glasssbox.com
Glassbox: Open Source and Automated Application Troubleshooting Ron Bodkin Glassbox Project Leader ron.bodkin@glasssbox.com First a summary Glassbox is an open source automated troubleshooter for Java
More informationWhite Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems
White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service
More informationRemote Pointcut - A Language Construct for Distributed AOP
Remote Pointcut - A Language Construct for Distributed AOP Muga Nishizawa (Tokyo Tech) Shigeru Chiba (Tokyo Tech) Michiaki Tatsubori (IBM) 1 Pointcut-advice model Joinpoints Program execution is modeled
More informationzen Platform technical white paper
zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant
More informationDelivering Heterogeneous Hydrologic Data services with an Enterprise Service Bus Application
18 th World IMACS / MODSIM Congress, Cairns, Australia 13-17 July 2009 http://mssanz.org.au/modsim09 Delivering Heterogeneous Hydrologic Data services with an Enterprise Service Bus Abstract: Bai, Q.F
More informationDesigning an Enterprise Application Framework for Service-Oriented Architecture 1
Designing an Enterprise Application Framework for Service-Oriented Architecture 1 Shyam Kumar Doddavula, Sandeep Karamongikar Abstract This article is an attempt to present an approach for transforming
More informationIntegration of Application Business Logic and Business Rules with DSL and AOP
e-informatica Software Engineering Journal, Volume 4, Issue, 200 Integration of Application Business Logic and Business Rules with DSL and AOP Bogumiła Hnatkowska, Krzysztof Kasprzyk Faculty of Computer
More informationRemote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
More informationCopyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
More informationEncapsulating Crosscutting Concerns in System Software
Encapsulating Crosscutting Concerns in System Software Christa Schwanninger, Egon Wuchner, Michael Kircher Siemens AG Otto-Hahn-Ring 6 81739 Munich Germany {christa.schwanninger,egon.wuchner,michael.kircher}@siemens.com
More informationHow To Combine Feature-Oriented And Aspect-Oriented Programming To Support Software Evolution
Combining Feature-Oriented and Aspect-Oriented Programming to Support Software Evolution Sven Apel, Thomas Leich, Marko Rosenmüller, and Gunter Saake Department of Computer Science Otto-von-Guericke-University
More informationComposing Concerns with a Framework Approach
Composing Concerns with a Framework Approach Constantinos A. Constantinides 1,2 and Tzilla Elrad 2 1 Mathematical and Computer Sciences Department Loyola University Chicago cac@cs.luc.edu 2 Concurrent
More informationGENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK
Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science
More informationWeb Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
More informationCombining Feature-Oriented and Aspect-Oriented Programming to Support Software Evolution
Combining Feature-Oriented and Aspect-Oriented Programming to Support Software Evolution Sven Apel, Thomas Leich, Marko Rosenmüller, and Gunter Saake Department of Computer Science University of Magdeburg,
More informationCase Studies of Running the Platform. NetBeans UML Servlet JSP GlassFish EJB
September Case Studies of Running the Platform NetBeans UML Servlet JSP GlassFish EJB In this project we display in the browser the Hello World, Everyone! message created in the session bean with servlets
More informationHow To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
More informationIdentity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
More informationSpring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
More informationIntroduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
More informationOracle Identity Analytics Architecture. An Oracle White Paper July 2010
Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
More informationProject Software Security: Securing SendMail with JAAS and Polymer
Project Software Security: Securing SendMail with JAAS and Polymer Frank van Vliet frank@pine.nl Diego Ortiz Yepes d.a.ortiz.yepes@student.tue.nl Jornt van der Wiel j.h.v.d.wiel@student.tue.nl Guido Kok
More informationEnterprise Application Development In Java with AJAX and ORM
Enterprise Application Development In Java with AJAX and ORM ACCU London March 2010 ACCU Conference April 2010 Paul Grenyer Head of Software Engineering p.grenyer@validus-ivc.co.uk http://paulgrenyer.blogspot.com
More informationThe Nature and Importance of a Programming Paradigm
Multiple Software Development Paradigms and Multi-Paradigm Software Development Valentino Vranić vranic@elf.stuba.sk Abstract: While OOP (including OOA/D) is reaching the level of maturity of structured
More informationSecure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
More informationAspect-Oriented Multi-Client Chat Application
Aspect-Oriented Multi-Client Chat Application Duygu Ceylan, Gizem Gürcüoğlu, Sare G. Sevil Department of Computer Engineering, Bilkent University Ankara, Turkey 06800 dceylan, gizem, sareg @cs.bilkent.edu.tr
More informationSSC - Web development Model-View-Controller for Java web application development
SSC - Web development Model-View-Controller for Java web application development Shan He School for Computational Science University of Birmingham Module 06-19321: SSC Outline Outline of Topics Java Server
More informationActiveVOS Server Architecture. March 2009
ActiveVOS Server Architecture March 2009 Topics ActiveVOS Server Architecture Core Engine, Managers, Expression Languages BPEL4People People Activity WS HT Human Tasks Other Services JMS, REST, POJO,...
More informationRunning and Testing Java EE Applications in Embedded Mode with JupEEter Framework
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 21 No. 1 (2013), pp. 53-69 Running and Testing Java EE Applications in Embedded Mode with JupEEter Framework Marcin Kwapisz 1 1 Technical University of Lodz Faculty
More informationArchitecture Rules Enforcement and Governance Using Aspects
Architecture Rules Enforcement and Governance Using Aspects Srini Penchikala SATURN 2009 About the Speaker Enterprise Architect Writer, Speaker, Editor (InfoQ) Detroit Java User Group Leader Working with
More informationResearch Article. ISSN 2347-9523 (Print) *Corresponding author Lili Wang Email: lily@nepu.edu.cn
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4B):424-428 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
More informationVerifying Semantic of System Composition for an Aspect-Oriented Approach
2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach
More informationHarmless Advice. Daniel S Dantas Princeton University. with David Walker
Harmless Advice Daniel S Dantas Princeton University with David Walker Aspect Oriented Programming Aspect Oriented Programming IBM - 2004 IBM reports positive results in aspect-oriented programming experiments
More informationThick Client Application Security
Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
More informationSoftware Development Kit
Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice
More informationConverting Java EE Applications into OSGi Applications
Converting Java EE Applications into OSGi Applications Author: Nichole Stewart Date: Jan 27, 2011 2010 IBM Corporation THE INFORMATION CONTAINED IN THIS REPORT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.
More informationOpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
More informationAn Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications
An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications Germán Harvey Alférez Salinas Department of Computer Information Systems, Mission College,
More informationOverview. Edvantage Security
Overview West Virginia Department of Education (WVDE) is required by law to collect and store student and educator records, and takes seriously its obligations to secure information systems and protect
More informationAOJS: Aspect-Oriented JavaScript Programming Framework for Web Development
AOJS: Aspect-Oriented JavaScript Programming Framework for Web Development Hironori Washizaki,Atsuto Kubo,Tomohiko Mizumachi,Kazuki Eguchi,Yoshiaki Fukazawa Waseda University, 3-4-1, Okubo, Shinjuku-ku,
More informationThe Spring Framework: An Open Source Java Platform for Developing Robust Java Applications
International Journal of Innovative Technology and Exploring Engineering (IJITEE) The Spring Framework: An Open Source Java Platform for Developing Robust Java Applications Dashrath Mane, Ketaki Chitnis,
More informationLoad balancing using Remote Method Invocation (JAVA RMI)
Load balancing using Remote Method Invocation (JAVA RMI) Ms. N. D. Rahatgaonkar 1, Prof. Mr. P. A. Tijare 2 1 Department of Computer Science & Engg and Information Technology Sipna s College of Engg &
More informationCopyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
More informationDistributed Systems Development: Can we Enhance Evolution by using AspectJ?
Distributed Systems Development: Can we Enhance Evolution by using AspectJ? Cormac Driver Siobhán Clarke Distributed Systems Group, Computer Science Department, Trinity College Dublin, Ireland {Cormac.Driver,
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationBeginning POJOs. From Novice to Professional. Brian Sam-Bodden
Beginning POJOs From Novice to Professional Brian Sam-Bodden Contents About the Author Acknowledgments Introduction.XIII xv XVII CHAPTER1 Introduction The Java EE Market Case Study: The TechConf Website...
More informationAPPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
More informationControlling Web Access with BMC Web Access Manager WHITE PAPER
Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3
More informationConcern Highlight: A Tool for Concern Exploration and Visualization
Concern Highlight: A Tool for Concern Exploration and Visualization Eugen C. Nistor André van der Hoek Department of Informatics School of Information and Computer Sciences University of California, Irvine
More informationIntroducing a Graduate Course on. called Aspect-Oriented Software Development
Int. J. Engng Ed. Vol. 21, No. 2, pp. 361±368, 2005 0949-149X/91 $3.00+0.00 Printed in Great Britain. # 2005 TEMPUS Publications. Introducing a Graduate Course on Aspect-Oriented Software Development*
More information1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What
More informationJava Application Developer Certificate Program Competencies
Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle
More informationDefense In-Depth to Achieve Unbreakable Database Security
Defense In-Depth to Achieve Unbreakable Database Security Qiang Lin, Ph.D Abstract Enterprises realize that sole reliance on generic security mechanisms does not provide the protection they need for their
More informationOracle Application Development Framework Overview
An Oracle White Paper June 2011 Oracle Application Development Framework Overview Introduction... 1 Oracle ADF Making Java EE Development Simpler... 2 THE ORACLE ADF ARCHITECTURE... 3 The Business Services
More informationOASIS: Organic Aspects for System Infrastructure Software Easing Evolution and Adaptation through Natural Decomposition
OASIS: Organic Aspects for System Infrastructure Software Easing Evolution and Adaptation through Natural Decomposition Celina Gibbs and Yvonne Coady University of Victoria Abstract It is becoming increasingly
More informationAspect Refactoring Verifier
Aspect Refactoring Verifier Charles Zhang and Julie Waterhouse Hans-Arno Jacobsen Centers for Advanced Studies Department of Electrical and IBM Toronto Lab Computer Engineering juliew@ca.ibm.com and Department
More informationOracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
More informationHow to Model Aspect-Oriented Web Services
How to Model Aspect-Oriented Web Services Guadalupe Ortiz Juan Hernández gobellot@unex.es juanher@unex.es Quercus Software Engineering Group University of Extremadura Computer Science Department Pedro
More informationCHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
More informationRoles in Building Web Applications using Java
Roles in Building Web Applications using Java Guido Boella Dipartimento di Informatica Università di Torino Italy +390116706711 guido@di.unito.it Andrea Cerisara Dipartimento di Informatica Università
More informationJava EE 7: Back-End Server Application Development
Oracle University Contact Us: 01-800-913-0322 Java EE 7: Back-End Server Application Development Duration: 5 Days What you will learn The Java EE 7: Back-End Server Application Development training teaches
More informationSecret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
More informationHIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
More informationAspect-oriented software engineering
M21_SOMM5152_09_SE_C21.qxd 1/7/10 2:31 PM Page 565 21 Aspect-oriented software engineering Objectives The objective of this chapter is to introduce you to aspect-oriented software development, which is
More informationEnterprise AOP with Spring Applications IN ACTION SAMPLE CHAPTER. Ramnivas Laddad FOREWORD BY ROD JOHNSON MANNING
Enterprise AOP with Spring Applications IN ACTION SAMPLE CHAPTER Ramnivas Laddad FOREWORD BY ROD JOHNSON MANNING AspectJ in Action Second Edition by Ramnivas Laddad Chapter 10 Copyright 2010 Manning Publications
More informationHPC Portal Development Platform with E-Business and HPC Portlets
HPC Portal Development Platform with E-Business and HPC Portlets CHIEN-HENG WU National Center for High-Performance Computing, Hsin-Chu, 300, Taiwan E-mail: garywu@nchc.org.tw Abstract HPC Portal Development
More informationOpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
More informationOpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
More informationDynamic Adaptability of Services in Enterprise JavaBeans Architecture
1. Introduction Dynamic Adaptability of Services in Enterprise JavaBeans Architecture Zahi Jarir *, Pierre-Charles David **, Thomas Ledoux ** zahijarir@ucam.ac.ma, {pcdavid, ledoux}@emn.fr (*) Faculté
More informationMarkLogic Server. Understanding and Using Security Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.
Understanding and Using Security Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Understanding
More information